...
In our internal directory scenario described above, the admin when onboarding these applications in EmpowerID would select the Account Store that had been defined for the app's internal directory. This lets EmpowerID know in which Account Store the accounts and groups are located that can be granted access to the application. However, in our eternal directory scenario, the admin would onboard multiple applications where EmpowerID would be selected as the Account Store of the external directory they relied on would be selectedfor the application. In this scenario, where many applications in EmpowerID share the same Account Store for their security, the application owner can select which specific groups in that any Account Store should be identified to link as granting access to that application.
...
Protected Application Resources like pages, controls, APIs
SSO Connections (SAML, OpenID Connect, etc.)
OAuth Scopes configuration
Multi-Factor Authentication settings
PBAC rights and roles
Groups and roles that should be requestable for this app in the IT Shop
Info |
---|
Key Takeaways:
|